检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:马顺利[1] 乜国雷[1] 叶涛[1] 刘昕[1] MA Shunli, NIE Guolei, YE Tao, LIU Xin(School of Computer, Qinghai Nationalities University, Xining 810007, Chin)
出 处:《光通信技术》2018年第5期41-44,共4页Optical Communication Technology
基 金:青海省自然科学基金(2017-ZJ-912)资助;"青海省高寒地区智慧畜牧业监测网可信感知节点关键技术研究"资助
摘 要:光纤网络被入侵后,通过合理地选择节点可以在不加外部资源的条件下保证网络正常通信,但入侵的随机性给节点选择带来了困难。针对此问题,提出光纤网络在恶意数据入侵下移动中继节点动态分布选取算法,根据光纤网络硬件结构特点,在入侵约束条件下,建立基于映像的节点集群部署模型;消除入侵随机性带来的干扰,给出了移动中继节点选取的约束条件,结合光纤网络现有节点间的欧式距离和节点损坏情况,确定中继节点的可用数量和最优位置,提高光纤网络在入侵下的网络覆盖率和链路性能。实验结果表明,提出的移动中继节点分布系统设计可以有效改善光纤网络被入侵后的通信性能、提高网络的安全性。When the optical fiber network is invaded,the network can communicate normally without the external resource,but the randomness of the intrusion makes it difficult to select the nodes.The malicious data intrusion fiber network,mobile relay nodes are randomly distributed to the algorithm,based on the hardware characteristics of the optical fiber network,intrusion in the environment,the establishment of a deployment model based on node cluster image;eliminate randomness,mobile relay selection constraints are given,combined with Euclidean distance and node existing fiber network between damage sure,the number of available relay nodes and the optimal position,improve the network intrusion in the optical fiber network coverage and link performance under.The experimental data shows that the proposed mobile relay node distribution system design can effectively improve the communication performance of the optical fiber network after invasion and improve the security of the network.
分 类 号:TN911[电子电信—通信与信息系统]
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.46